Internet research ethics: The field and its critical issues
EA Buchanan, C Ess - The handbook of information and …, 2008 - Wiley Online Library
Internet research ethics (IRE) is an emerging multi-and interdisciplinary field that
systematically studies the ethical implications that arise from the use of the Internet as a …
systematically studies the ethical implications that arise from the use of the Internet as a …
The menlo report
On 28 December 2011, the US Department of Homeland Security, Science and Technology,
Cyber Security Division released" The Menlo Report: Ethical Principles Guiding Information …
Cyber Security Division released" The Menlo Report: Ethical Principles Guiding Information …
“How technical do you get? I'm an English teacher”: Teaching and Learning Cybersecurity and AI Ethics in High School
Today's cybersecurity and AI technologies are often fraught with ethical challenges. One
promising direction is to teach cybersecurity and AI ethics to today's youth. However, we …
promising direction is to teach cybersecurity and AI ethics to today's youth. However, we …
Ethics governance development: The case of the Menlo Report
M Finn, K Shilton - Social Studies of Science, 2023 - journals.sagepub.com
The 2012 Menlo Report was an effort in which a group of computer scientists, US
government funders, and lawyers produced ethics guidelines for research in information and …
government funders, and lawyers produced ethics guidelines for research in information and …
[PDF][PDF] Ethical frameworks for cybersecurity
This chapter presents several ethical frameworks that are useful for analysing ethical
questions of cybersecurity. It begins with two frameworks that are important in practice: the …
questions of cybersecurity. It begins with two frameworks that are important in practice: the …
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure
AR Nygård, SK Katsikas - Information & Computer Security, 2024 - emerald.com
Purpose This paper aims to discuss the ethical aspects of hardware reverse engineering
(HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the …
(HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the …
Computer science security research and human subjects: Emerging considerations for research ethics boards
E Buchanan, J Aycock, S Dexter… - Journal of Empirical …, 2011 - journals.sagepub.com
This paper explores the growing concerns with computer science research, and in particular,
computer security research and its relationship with the committees that review human …
computer security research and its relationship with the committees that review human …
Human-In-The-Loop Automatic Program Repair
learn2fix is a human-in-the-loop interactive program repair technique, which can be applied
when no bug oracle—except the user who is reporting the bug—is available. This approach …
when no bug oracle—except the user who is reporting the bug—is available. This approach …
DDOS attack detection and mitigation technique based on Http count and verification using CAPTCHA
With the rapid development of internet, the number of people who are online also increases
tremendously. But now a day's we find not only growing positive use of internet but also the …
tremendously. But now a day's we find not only growing positive use of internet but also the …
[PDF][PDF] Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering.
We provide an overview of technical and ethical considerations for measuring Internet
filtering, focusing on clientside and network side channel techniques. Client-side …
filtering, focusing on clientside and network side channel techniques. Client-side …